Vulnerability identifier: #VU56610
Vulnerability risk: Low
CVSSv3.1:
CVE-ID:
CWE-ID:
Exploitation vector: Network
Exploit availability:
Vulnerable software:
cURL
Client/Desktop applications /
Other client software
Vendor: curl.haxx.se
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when sending data to an MQTT server. A remote attacker with ability to control libcurl input can trigger a double free error and perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
cURL: 7.73.0 - 7.78.0
Fixed software versions
CPE
External links
http://curl.haxx.se/docs/CVE-2021-22945.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?